View PDF - ijournals

A Web Service Quality of Protection using
AHP Method
V.Prasath
Assistant Professor, PKIET, Karaikal, U.T.Puducherry
ABSTRACT
As the number of Web services on the internet increase,
the need for finding the exact web service that matches
the user’s request also increases. So ranking of web
services is required in order to find the right web
service. The main goal of this research paper is to
achieve security of the web service can be summarized
to this single value. In this paper we propose analytical
hierarchy process (AHP) to evaluate the weights of
criteria instead of collect the weights directly from
service consumer. Next to reduce the complexity of
involving all the security parameters we follow the
greedy approach to evaluate and estimate each and
every parameter of web service security.
General Terms
Web Service Security
Keywords
Ws-Security, AHP, Greedy, Service Discovery
1. INTRODUCTION
Web services are one of the most promising
technologies for building distributed systems that has
the potential of becoming the core of a new webbased
middleware
platform,
providing
interoperability between computational services. In
this specific context security is very important
feature.
Nowadays,
many
companies
and
organizations implement their core business and
application services over Internet. Thus, the ability to
efficiently and effectively select and integrate interorganizational and heterogeneous services on the
Web at runtime is an important step towards the
development of the web service applications [1]. If
multiple Web services provide the same functionality,
then a Quality of service requirement can be used as a
secondary criterion for service selection. Next high
importance of Web services is security. To ensuring
the web service to some level of security to real
systems has been evident since it has been discovered
that most attacks may exploit vulnerabilities [2, 3, 4].
These vulnerabilities stem from web service are
poorly designed and developed. Security is a set of
non-functional
attributes
like
confidentiality,
integrity, availability. The current Universal
Description, Discovery and Integration (UDDI)
registries only support Web services discovery based
on the functional aspects of services. To practically
examine the resistance of attacks of a small subset of
security patterns that are commonly used in web
© 2014, IJOURNALS All Rights Reserved
service applications. To perform this evaluation, it has
to built a system with web services security testing
patterns and using them to study systems under
known categories of attacks to web service
applications [5] and determine which aspects of
security are enhanced through the use of each
security pattern for web service system. This paper
will describe a testing methodology for web services
security and outline a process that can be adopted to
evaluate web services security can be summarized to
single value. To define security as a measure of
vulnerabilities in the accuracy of a risk or security
measurement, analytical hierarchy process is used. In
order to render the definition useable, it is necessary
to associate the terms in the definition with a
measurement scale that represents the security of a
system as a value between 1 (secure) and 9
(insecure).
2. RELATED WORK
Several authors conducted performance evaluation
studies of WS-Security. Security for web services
means providing authentication, authorization,
confidentiality, and non-repudiation as basic
representative [6]. Each of these aspects is described
below
Li Jiang, Hao Chen, Fei Deng, Qiusheng Zhong [7]
proposed Web service security evaluation method
based on threat classification is proposed, which can
process security evaluation to Web service from
different angles of view, such as spoofing, tampering,
repudiation, message disclosure, denial of service and
elevation of privilege, and can provide a referential
evaluation index of Web service security for the users
through the threat modeling and evaluating the
degree of security.
Bachar Alrouh and Gheorghita Ghinea [8] consider
and compare the performance of various security
mechanisms applied on a simple web service tested
with different initial message sizes. The test results
show that transport layer security mechanisms are
considerably faster than message level security
mechanisms.
Artsiom Yautsiukhin. [9] argue that security must be
guaranteed for data processing and requirements
must be negotiated with a client and inserted into the
agreement between a client and a contractor. The
problem is that a client and a contractor have
different views on how these requirements should
look like. We propose a methodology which binds
Page 93
these views and describes a process for selection the
security configuration that helps to achieve
negotiated level of protection.
GannaFrankova and ArtsiomYautsiukhinork [10]
propose a methodology that identifies the concrete
business process providing the highest quality of
service and protection among all possible design
alternatives. the orchestrator should design its
business process aggregating web services in such a
way as to make it more efficient from the quality of
service and protection point of view.
González, Ricardo Mendoza [11] propose in a
theoretical manner including the knowledge offered
by the proposed specification based on patterns in a
new level for the architectural structure of WSSecurity specification, which is currently one of the
most popular specifications to establish secure web
services.
Duan Youxiang , Gao Yang. [12] says vulnerabilities
have been threatening Web Services confidentiality,
so it is meaningful to quantitatively evaluate them,
which can reflects web services security reasonably
and directly, and it will be convenient for user to
choose service and deploy security measures.
AHP(Analytic Hierarchy Process) algorithm is been
involved in this paper to dissect indicator. Operations
research and fuzzy mathematical theory are also used
to qualitatively and quantitatively evaluate
vulnerabilities based on the rank of web services
confidentiality.
3. PROPOSED WORK
In this proposed approach as shown in Figure 1, first
use of greedy approach to select desired security
parameter and the weighting of each criteria will be
evaluated by using AHP and then ranking the web
services based on this evaluated value. The steps of
our approach are shown in below
Recognize
Relation of
Criteria
criteria and the options provided by the user. In
addition, the AHP is simple because there is no need
of building a complex expert system with the decision
maker’s knowledge embedded in it.
AHP is a pair wise comparison method that each
criterion is comparing to each other and gets the
score with respect to Table 1.The AHP can be
implemented in three simple consecutive steps:
1) Computing the vector of criteria weights
2) Computing the matrix of option scores
3) Ranking the options
Table 1. Preference Level
Descriptor
Value
Exceptional
Outstanding
Excellent
Very Good
Good
Satisfactory
Fair
Marginal
Poor
3.2 Computing criteria weights and
Pair Wise matrix
In the following the steps of AHP pair wise evaluation
are described:
Step1: Sum all the values in each column.
Step2: The values in each column are divided by the
corresponding column sums.
Step3: Convert fractions to decimals and find the
average of each row. This sum is corresponding to
weight of the criterion of the row.
A
B
C
A
1
x
1/y
B
1/x
1
1/z
C
y
z
1
Greedy
AHP
Weights of
Criteria
Numerical
Score
1
2
3
4
5
6
7
8
9
Fig 2. Evaluation Weight Matrix
Ranking of
Web Services
Fig 1: Quality of Protection using AHP
3.1 AHP
The AHP is a very flexible and powerful tool because
the scores, and the final ranking, are obtained on the
basis of the pair wise relative evaluations of both the
© 2014, IJOURNALS All Rights Reserved
In order to compute the weights for different criteria,
the AHP starts creating a pair wise comparison matrix
A. The matrix A is a m*m real matrix, where m is the
number of evaluation criteria considered each entry
ajk of the matrix A represents 1the importance of the
jth criterion relative to the kth criterion. if ajk >1
,then the jth criterion is more important than the kth
criterion, while if ajk<1,then the jth criterion is less
important than the kth criterion, if two criteria have
the same importance, then the entry ajk is 1.The
Page 94
mess
age
Infor
matio
n
Leaka
ge
ation
gatheri
ng
tion
Disclosu
re
messages
within
SOAP
faults can
contain
detailed
platform
informatio
n and
implement
ation
details
such as
code
fragments
or stack
traces.
g
4
Nume
rical
Value
s
Fuzzin
g
Informa
tion
Disclosu
re
Any value
that is only
as a
numerical
value or is
expected
to be a
numerical
value.
Ratin
g
5
Base6
4
Enco
ded
Value
s
Fuzzin
g
Tamperi
ng
Base64 is
used to
encode
binary
data in
order to
conform to
XML
specificati
ons.
Ratin
g
6
Chara
cter
String
s
Fuzzin
g
Tamperi
ng
This
verybroad
category
general
guidelines
for any
data that is
not of any
particularl
y
classifiable
form.
Ratin
g
7
Gener
al
value
s
Fuzzin
g
Tamperi
ng
If it is not
possible to
indentify
the nature
of the
values
beings
supplied
this
category
provides a
general
Ratin
g
entries ajk and akj satisfy the following constraint
[13]
Once the matrix A is built, it is possible to derive from
A the normalized pairwise comparison matrix A norm
by making equal to 1 the sum of the entries on each
column, i.e. each entry jka of the matrix A norm is
computed as
Finally, the criteria weight vector w (that is an mdimensional column vector) is built by averaging the
entries on each row of A norm, i.e.
4. RISK EVALUATION
There are many different approaches to risk analysis.
Our approach presented here is based on these
standard methodologies and is customized for web
services security testing methodology based on
STRIDE attacks. The STRIDE (Spoofing, Tampering,
Repudiation, Information disclosure, Denial of
Service, and Elevation of privilege) model was used
by Microsoft for categorizing threats (Casteele, 2005).
This means that the STRIDE model is used to
categorize the threats by taking into account their
effects on the security of the application
(Casteele,2005)[14].
Table 2. Threat Mappings
Sl
.N
o
Para
mete
r
Asset
1
Wsdl
Scann
ing
Inform
ation
gatheri
ng
Informa
tion
Disclosu
re
It
describing
the
functionali
ty offered
by the web
service
and the
parameter
s required
to use it.
Ratin
g
2
Web
Meth
od
Enum
eratio
n
Inform
ation
gatheri
ng
Informa
tion
Disclosu
re
Not all
implement
ed
methods
may be
published
in the
WSDL
document
Ratin
g
3
Error
Inform
Informa
Error
Ratin
Threat
© 2014, IJOURNALS All Rights Reserved
Descriptio
n
Meas
urem
ent
Page 95
overview
of the
types of
inputs that
should be
tested.
8
Sub
syste
m
para
meter
Fuzzin
g
Spoofin
g
This
category
relates to
any values
that may
used to
influence
output on
the client
side of the
application
.
Ratin
g
9
Addr
essin
g
para
meter
s
Fuzzin
g
Tamperi
ng
System
often use
addressing
informatio
n to access
informatio
n
directories
.
Ratin
g
Loggi
ng
value
s
Fuzzin
g
Any value
that is
logged
directly to
some
medium
has the
potential
to
somehow
corrupt
logs or
provide an
inaccurate
view.
Ratin
g
Any value
that may
be used as
part of an
SQL query
should be
tested for
the ability
to change
SQL
processing
in some
way,possib
ly causing
data
disclosure.
Ratin
g
If an
Ratin
1
0
1
1
1
Sql
Inject
ion
Com
Injecti
on
Injecti
Tamperi
ng
Spoofin
g
Tamperi
© 2014, IJOURNALS All Rights Reserved
2
mand
Inject
ion
on
ng
internal
system is
used to
execute
existing
commands
and input
to these
commands
is not
properly
validated,it
may be
possible to
run
commands
of the
user’s
choosing.
g
1
3
Lpath
Injecti
on
Spoofin
g
If LDAP
queries are
constructe
d directly
from user
input, this
may result
in
significant
system
compromi
se,particul
arly in the
disclosure
of user
credentials
.
Ratin
g
Inject
ion
1
4
Xpath
Inject
ion
Injecti
on
Informa
tion
Disclosu
re
The use of
user
supplied
input in an
XPath
query may
provide an
attacker
with the
ability to
modify the
query.
Ratin
g
1
5
Code
Injecti
on
Elevatio
n of
Privileg
es
If an
validated
user
supplied
input is
supplied to
calls to
eval-type
functions,
malicious
commands
may be
Ratin
g
Inject
ion
Page 96
inadverten
tly
executed
by the web
service
1
6
Ciphe
r
Confid
entialit
y
choic
e
Informa
tion
Disclosu
re
The choice
of
encryption
cipher will
influence
the
strength of
the
encryption
and the
ability for
an attacker
to
successfull
y crack the
encryption
and
recover
plaintext
data
Ratin
g
1
7
Encry
ption
Cover
age
Confid
entialit
y
Informa
tion
Disclosu
re
Encryption
should be
applied
overall
sensitive
portions of
messages
to ensure
they are
protected
against un
authorized
eaves
dropping..
Ratin
g
1
8
Repla
y
Attac
ks
Integri
ty
Spoofin
g
A replay
attack
involves
the
malicious
use of a
valid
message or
set of
messages
that has
already
been
accepted
by the web
service
previously.
Ratin
g
Integrity
checks
should be
used to
Ratin
g
1
9
Integ
rity
Check
Cover
Integri
ty
Tamperi
ng
© 2014, IJOURNALS All Rights Reserved
protect
important
data
against
unauthoriz
ed
modificati
on.
age
2
0
Invali
d Xml
Integri
ty
Denial
of
service
WSSecurity
and other
web sevice
security
standards
are XMLbased and
their
implement
ations
require
properly
formed
XML to
function
properly.
Ratin
g
2
1
Unsu
pport
ed
algori
thms
Integri
ty
Tamperi
ng
Verify that
if
unsupport
ed
algorithms
are
requested
or the
client
claims to
root
support
required
algorithms,
access is
denied and
processing
of the
request
does not
continue.
Ratin
g
2
2
Separ
ator
Inject
ion
Loggin
g
Repudia
tion
Log entries
are
commonly
delimitedu
sing a
particular
separator
character.
Ratin
g
2
3
White
Space
Inject
ion
Loggin
g
Repudia
tion
White
space
characters
can be
used to
modify the
Ratin
g
Page 97
appearanc
e of log
entries
when they
are
viewed.
2
4
Brute
-
Authen
ticatio
n
Force
and
Dictio
nary
Attac
ks
2
5
2
6
2
7
Forge
d
Crede
ntials
Missi
ng
Crede
ntials
Toke
n
Forge
ry
Authen
ticatio
n
Authen
ticatio
n
Author
ization
Elevatio
n of
Privileg
es
Elevatio
n of
Privileg
es
Spoofin
g
Elevatio
n of
privileg
es
© 2014, IJOURNALS All Rights Reserved
These
types of
attacks are
typically
used
against
password
authentica
tion
systems
and rely on
the ability
to
repeatedly
test
potential
passwords
against the
authentica
tion
service.
Ratin
g
Credential
s should be
issued by
an
authorized
party and
verified by
the
application
when
presented.
Ratin
g
A user that
fails to
present
credentials
should not
be allowed
access and
the
application
should
discard
their
request.
Ratin
g
As SOAP is
a stateless
messagebased
protocol
,some
mechanis
m must be
implement
Ratin
g
ed to
provide
authorizati
on
between
SOAP
requests
or
maintain
session
state.
2
8
Hijac
king
Attac
ks
Author
ization
Tamperi
ng
As SOAP is
a stateless
messagebased
protocol,
some
mechanis
m must be
implement
ed to
provide
authorizati
on
between
SOAP
requests
or
maintain
session
state.
Ratin
g
2
9
Para
meter
Tamp
ering
Availa
bility
Denial
of
service
This broad
class of
attacks
refers to
the
modificati
on of SOAP
request
parameter
s in transit
between
client and
server.
Ratin
g
3
0
Coerc
ive
Availa
bility
Denial
of
service
Coercive
parsing is
the attacks
that
involve
supplying
illegal or
malformed
SOAP
requests to
the web
service in
order to
cause
undesirabl
Ratin
g
Parsi
ng
Page 98
e behavior.
S1=0.22
S2=0.13 S3=0.1 S4=0.25
T1=0.28 T2=0.12 T3=0.22 T4=0.91 T5=0.23
SOAP Sonar web services penetration testing tool
used to evaluate web services security under known
attacks [15]. Bringing this approach to find attacks
that found the major security flaws of the web service
meaning the four Spoofing, five Tampering and four
Reputation Parameters attacks errors that poses
number of threat to web service security.
If we involve all the thirty parameters mentioned in
table2, complexity for estimating the effectiveness of
web service increases. As a solution to this, we follow
the mechanism of greedy approach. The core
principle of the Greedy approach is to involve
minimum number of input to achieve the final
optimized result.
Spoofing Attacks - Sub-system, SQL Injection, Xpath
Injection, Replay Attacks.
Tampering Attacks - Code Injection, Invalid XML,
Encryption Coverage, Numerical Values, Command
Injection.
Repudiation Attacks - White space injection,
Separator Injection, HTML Injection, Size Overflow.
We do pair wise comparing between criteria and the
below matrix is the result of the comparison with
respect to Table1.We assume that based on above
attacks exits in number of times with respect of four
QoP criteria is gathered and the matrix is prepared.
Table 3. Preference Level for Spoofing
R1=0.37 R2=0.15 R3=0.28 R4=0.20
We assume that based on above example the data of
six alternatives STRIDE with respect of four QoP
criteria is gathered and the overall matrix is prepared
with respect to number of attacks existing in each
web service using Soap Sonar test tool.
5. CONCLUSIONS
In this paper we addressed web service security by
involving Greedy approach to select desired security
parameter using stride pattern and AHP method for
evaluation weighting of criteria for each web service
for final ranking.
6. REFERENCES
[1] Bin Xu, Tao Li, Zhifeng Gu, Gang Wu “Quick Web
Service Discovery and Composition in SEWSIP”,
Proceedings of the 8th IEEE International
Conference on E-Commerce Technology and the
3rd IEEE International Conference on Enterprise
Computing, E-Commerce, and E-Services
(CEC/EEE’06).
[2] J. Viega and G. McGraw, Building Secure
Software, How to Avoid Security Problems the
Right Way, Addison Wesley, 2002
[3] G. Hoglund and G. McGraw, Exploiting Software,
How to Break Code, Addison Wesley, 2004.
[4] M. Howard and D. LeBlanc, Writing Secure Code,
Microsoft Press, 2002.
[5] Vu, L., Hauswirth, M., and Aberer, K. (2005).
“QoSbased service selection and ranking with
trust and reputation management”. In Proc. of
the Intl. conf. on Cooperative Information
Systems (CoopIS), Agia apa, Cyprus.
Table 4. Preference Level for Tampering
[6] J.Scambray and M.Shema, Hacking Exposed Web
Applications, McGrawHill, 2002
[7] Li Jiang, Hao Chen, Fei Deng, Qiusheng Zhong.“A
Security Evaluation Method Based on Threat
Classification for Web Service”, Journal of
Software, Vol 6, No 4 (2011), 595-603, Apr 2011
Table 5. Preference Level for Reputation
[8] Bachar Alrouh and Gheorghita Ghinea. “A
Performance Evaluation of Security Mechanisms
for Web services”, Fifth International Conference
on Information Assurance and Security 2009.
[9]
Based on the above table we apply steps1-3 in section
3.3 and the weights of criteria are as follow:
© 2014, IJOURNALS All Rights Reserved
Artsiom Yautsiukhin. “Quality of Protection
Determination for Web Services”. This work was
partly supported by the project EU-IST-IPSERENITY, contract N 27587.
[10] GannaFrankova
and
ArtsiomYautsiukhinork.“Service and Protection
Level Agreements for Business Processes”, This
work has been partly supported by the IST-FP6IP-SERENITY and IST-FP6-IP-SENSORIA projects
Page 99
[11] González, Ricardo Mendoza. “Web ServiceSecurity Specification based on Usability Criteria
and Pattern Approach” Journal of Computers .
Aug2009, Vol. 4 Issue 8, p705-712. 8p
[12] Duan Youxiang, Gao Yang. “Evaluating
Vulnerabilities Quantitatively Based On the Rank
of Web Services Confidentiality” Journal of Next
Generation Information Technology, volume 2,
Number 1, February, 2011
[15] http://www.softpedia.com/get/Authoringtools/Authoring-Related/SOAPSonar-EnterpriseEdition.shtml
[16] Mojtaba Khezrian1, Wan M. N. Wan Kadir2,
Suhaimi Ibrahim3,‎ and‎ Alaeddin‎ Kalantari.‎ “A
Hybrid Approach for Web Service Selection”,
/International
Journal
Of
Computational
Engineering Research Jan-Feb 2012 , Vol. 2,
Issue1.
[13] Analytic Hierarchy Process,
www.dii.unisi.it/~mocenni/Note_AHP.pdf‎
[14] Casteele, S.V. (2005). Threat modeling for web
application using STRIDE model.
© 2014, IJOURNALS All Rights Reserved
Page 100